Behavioral task
behavioral1
Sample
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
Resource
ubuntu1804-amd64-en-20211208
1 signatures
150 seconds
General
-
Target
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
-
Size
91KB
-
MD5
40236df24deb0eea4094872ee7b3084a
-
SHA1
ad2b4056f858c3cd6c85eb8c18aedcbd0d52463e
-
SHA256
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
-
SHA512
b17f6dc75d26412ea466308279d562a511b293a482c746575bf40a2eab70b29697a5035d9e500428cefa1a1f70cfc69d8c4eec75866b361b7f575671210972a3
-
SSDEEP
1536:aw7ykwtjyNU5UMTIO1bCFdvT/stkDz23Ymy+WKLm7oa702w/4jdy21Mh7ylLN2UE:awbwt4U5UM11advLstk/oYm3UoaI2ShH
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd.elf linux x86